D:\SVN\toydefense2\toydefense-scifi\dev\branch\version1_6\win\ToyDefense4_Sci-Fi-Partner-Release.pdb
Static task
static1
Behavioral task
behavioral1
Sample
2024-03-15_f3f3aa339fb4e473bbea8bdd81d1238a_magniber.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2024-03-15_f3f3aa339fb4e473bbea8bdd81d1238a_magniber.exe
Resource
win10v2004-20231215-en
General
-
Target
2024-03-15_f3f3aa339fb4e473bbea8bdd81d1238a_magniber
-
Size
11.8MB
-
MD5
f3f3aa339fb4e473bbea8bdd81d1238a
-
SHA1
115b18ca1dbe1179a7c33c95f61cc84792b9398f
-
SHA256
92d01c7b5d6aa3724f72098e2792271a741049080617c866b7c0f24896d5624d
-
SHA512
17215166e7d6458ccb73efbdf612a4882476ff74989af6721eb0f222538daa45a926fab5a5e5d78ab7fe39b7a8f92a76f67a6aedde811eaa33aa1091cc5fcbda
-
SSDEEP
98304:igFl6m5ungRvGTGrwz02sZFq2EViDo94GcEFv9vcx5TCAj7eNMGe8aqeFN6pPzvD:L6mxRveywd0FaViDo94GlYTrGe8EK7v
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2024-03-15_f3f3aa339fb4e473bbea8bdd81d1238a_magniber
Files
-
2024-03-15_f3f3aa339fb4e473bbea8bdd81d1238a_magniber.exe windows:5 windows x86 arch:x86
bd9d07441c40c0c0088992d805f318fd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetFileInformationByHandle
FileTimeToSystemTime
GetDriveTypeW
FindFirstFileExW
FileTimeToLocalFileTime
ExpandEnvironmentStringsA
PeekNamedPipe
GetFullPathNameW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetFullPathNameA
GetVersion
GlobalMemoryStatus
FlushConsoleInputBuffer
GetNumberOfConsoleInputEvents
PeekConsoleInputA
ReadConsoleInputA
SetConsoleMode
GetFileAttributesExW
SetFileAttributesW
FindFirstFileA
QueryPerformanceFrequency
GetLastError
GetLongPathNameW
GetCurrentProcess
GlobalAlloc
GlobalLock
GlobalUnlock
LocalFree
SwitchToThread
FormatMessageA
SleepEx
GetUserDefaultLCID
Sleep
FindClose
CreateDirectoryA
CreateDirectoryW
FindFirstFileW
FindNextFileW
GetTickCount
GetSystemTimeAsFileTime
InterlockedIncrement
InterlockedDecrement
GetProcAddress
GetLocalTime
DisableThreadLibraryCalls
GetCurrentThread
SetThreadPriority
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
IsBadWritePtr
FreeLibrary
LoadLibraryA
CreateThread
ExitThread
GetExitCodeThread
WaitForSingleObject
CloseHandle
GetStringTypeW
InterlockedExchange
EncodePointer
DecodePointer
RaiseException
InitializeCriticalSectionAndSpinCount
TryEnterCriticalSection
QueryPerformanceCounter
CreateTimerQueueTimer
CreateTimerQueue
IsProcessorFeaturePresent
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
RtlUnwind
HeapFree
GetStdHandle
GetFileType
GetModuleFileNameW
GetModuleHandleExW
WriteConsoleW
HeapAlloc
GetCommandLineW
IsDebuggerPresent
ExitProcess
AreFileApisANSI
HeapReAlloc
DeleteFileW
MoveFileExW
ReadFile
FatalAppExitA
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
TerminateProcess
GetStartupInfoW
GetModuleHandleW
CreateSemaphoreW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesW
WriteFile
HeapSize
DuplicateHandle
SetEvent
ReleaseSemaphore
CreateEventW
InitializeSListHead
UnregisterWaitEx
ChangeTimerQueueTimer
GetNumaHighestNodeNumber
RegisterWaitForSingleObject
DeleteTimerQueueTimer
GetProcessAffinityMask
SetThreadAffinityMask
DebugBreak
OutputDebugStringW
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
LoadLibraryExW
GetVersionExW
VirtualAlloc
VirtualFree
VirtualProtect
SetProcessAffinityMask
LoadLibraryW
GetProcessHeap
GetTimeZoneInformation
SetConsoleCtrlHandler
IsValidCodePage
GetACP
GetOEMCP
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetConsoleMode
ReadConsoleW
FlushFileBuffers
GetConsoleCP
CreateFileW
SetFilePointer
SetFilePointerEx
SetStdHandle
UnregisterWait
GetThreadPriority
WaitForMultipleObjectsEx
SetEndOfFile
SetEnvironmentVariableA
SignalObjectAndWait
GetFileSize
MapViewOfFile
CreateFileMappingA
CreateFileA
GetVersionExA
UnmapViewOfFile
LockResource
LoadResource
SizeofResource
FindResourceA
FindResourceW
OutputDebugStringA
MultiByteToWideChar
GetCurrentThreadId
WideCharToMultiByte
FindNextFileA
user32
LoadIconW
DestroyIcon
OpenClipboard
CloseClipboard
SetClipboardData
EmptyClipboard
MessageBoxA
ShowCursor
ScreenToClient
ShowWindow
SetWindowPos
UpdateWindow
SetActiveWindow
AdjustWindowRect
LoadCursorW
SetWindowLongW
IsIconic
GetWindowInfo
GetCursor
MessageBoxW
GetForegroundWindow
DrawTextA
DrawTextW
PeekMessageW
DispatchMessageW
TranslateMessage
wsprintfW
GetCursorPos
SetCursor
FindWindowW
GetWindowLongW
SetForegroundWindow
DestroyWindow
CreateWindowExW
RegisterClassExW
GetDesktopWindow
SendMessageW
GetUserObjectInformationW
GetProcessWindowStation
UnregisterClassW
PostQuitMessage
DefWindowProcW
SystemParametersInfoW
wininet
InternetGetConnectedState
sensapi
IsNetworkAlive
shlwapi
PathFindFileNameW
psapi
GetModuleFileNameExW
EnumProcessModules
winmm
timeBeginPeriod
timeGetTime
timeEndPeriod
d3d8
Direct3DCreate8
dinput8
DirectInput8Create
ws2_32
getaddrinfo
freeaddrinfo
gethostname
recv
listen
getsockopt
getsockname
getpeername
ioctlsocket
WSASetLastError
closesocket
bind
select
__WSAFDIsSet
shutdown
WSACleanup
sendto
setsockopt
socket
WSAStartup
connect
send
WSAGetLastError
htonl
htons
inet_addr
inet_ntoa
ntohl
ntohs
accept
recvfrom
gethostbyname
getservbyname
gdi32
SetBkColor
SetTextColor
SelectObject
GetDeviceCaps
GetBitmapBits
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
DeleteDC
CreateFontIndirectA
CreateDIBSection
CreateDCA
GetObjectA
CreateFontW
DeleteObject
SetBkMode
CreateSolidBrush
advapi32
RegOpenKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
DeregisterEventSource
RegisterEventSourceA
ReportEventA
RegQueryValueExW
shell32
SHGetSpecialFolderPathA
SHGetFolderPathW
ShellExecuteW
Sections
.text Size: 8.4MB - Virtual size: 8.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 395KB - Virtual size: 585KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 331KB - Virtual size: 330KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ